General

  • Target

    6efce5a7a230a95aadba617a2bdf4e0b0a27f17a4273c6144033229230a8ca69N

  • Size

    8.8MB

  • Sample

    241004-pqa9vaybne

  • MD5

    d2d03e5ab61f23ed8e1f57f691a0c160

  • SHA1

    ef3190a509b83a9ba864e39af7934925accb920d

  • SHA256

    6efce5a7a230a95aadba617a2bdf4e0b0a27f17a4273c6144033229230a8ca69

  • SHA512

    05c503900d808e8cf70904474f9550ef4b02b866867990b898d9f17163a2335ac211907d6c5795e0151541404dd4eecd4f031c69d396ddf7d30fe8a446b754f1

  • SSDEEP

    196608:Lxg8VEfNpwfI9jUC2gYBYv3vbW4SEf+iITx1U6nn:28VEfQIH2gYBgDWZjTnzn

Malware Config

Targets

    • Target

      6efce5a7a230a95aadba617a2bdf4e0b0a27f17a4273c6144033229230a8ca69N

    • Size

      8.8MB

    • MD5

      d2d03e5ab61f23ed8e1f57f691a0c160

    • SHA1

      ef3190a509b83a9ba864e39af7934925accb920d

    • SHA256

      6efce5a7a230a95aadba617a2bdf4e0b0a27f17a4273c6144033229230a8ca69

    • SHA512

      05c503900d808e8cf70904474f9550ef4b02b866867990b898d9f17163a2335ac211907d6c5795e0151541404dd4eecd4f031c69d396ddf7d30fe8a446b754f1

    • SSDEEP

      196608:Lxg8VEfNpwfI9jUC2gYBYv3vbW4SEf+iITx1U6nn:28VEfQIH2gYBgDWZjTnzn

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks